Listen "Common security vulnerabilities(Part 2)"
Episode Synopsis
0:22 - Welcome!!0:33 - Short recap from last week0:56 - Please share your feedback about the podcast in this google form1:10 - SQL InjectionInjecting malicious SQL statements into the database through the user input2:23 - How to preventTreat user input as untrusted - Filter and validate2:43 - Security misconfigurationHappens when a part of your web application is defenseless against attackUsing default credentialsAllowing users to have access to information about the application through the stack trace4:18 - How to preventDon't overshare informationHave a minimal footprint for the different components of your applicationDon't keep default accounts, files, or directories5:14 - Broken authenticationHappens when an attacker masquerades as a user through. different meansCredential stuffing: using known breached accountsAutomated attacks: using random credentialsDefault(lazy) credentialsStolen session Ids8:46 - How to preventThe web server could be used to create unique session ids different from the ones created by the browserAdd a limit to failed loginsMuti-factor authenticationPassword complexitySocial mediaRewire with Susan - InstagramSusan's Twitter, Facebook, and [email protected], feel free to share your thoughts and feedback hereSupport the show
More episodes of the podcast Rewire with Susan
Season Finale: Quick Recap
31/05/2022
Dev Chat: GETTING PAST MY FEAR AND LANDING MY DREAM JOB with Adora Nwodo(Cloud Engineer, Microsoft)
25/05/2022
Dev Chat: WORK-LIFE BALANCE AS A PROGRAMMER with Emeka Ashikodi (Software Engineer, The Zebra)
19/04/2022
SURVIVING LEGACY CODE
29/03/2022
WRITING JAVASCRIPT LIKE A PRO
22/03/2022
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.